Explorer

Malware That Targets macOS Being Advertised On Telegram Channel For $1000

A new macOS malware has been discovered that is capable of stealing sensitive information such as passwords and files and it was advertised on a Telegram channel.

A new macOS malware has been discovered that is capable of stealing sensitive information such as passwords and files and it was advertised on a Telegram channel for $1,000 per month. The macOS malware was found to be capable of extracting autofill information, passwords, wallets, cookies, credit card information, and more, according to researchers at Cyble Research and Intelligence Labs (CRIL).

Cyble Research and Intelligence Labs (CRIL) recently discovered a Telegram channel advertising a new information-stealing malware called Atomic macOS Stealer (AMOS). The malware is specifically designed to target macOS and can steal sensitive information from the victim’s machine.

"The TA behind this stealer is constantly improving this malware and adding new capabilities to make it more effective. The most recent update to the malware was highlighted in the Telegram post on April 25th, showcasing its latest features," Cyble wrote in a blog post.

"The TA also provides additional services such as a web panel for managing victims, meta mask brute-forcing for stealing seed and private keys, crypto checker, and dmg installer, after which it shares the logs via Telegram. These services are offered at a price of $1000 per month," Cyble added.

Moreover, the report said that the hacker behind this stealer is constantly improving this malware and adding new capabilities to make it more effective.

The malware's most recent update was seen in a Telegram post on April 25, highlighting its latest features.

According to the report, the Atomic macOS Stealer can steal various types of information from the victim's machine, including keychain passwords, complete system information, files from the desktop and documents folder, and even the macOS password.

In addition, the malware is designed to target multiple browsers and can extract auto-fills, passwords, cookies, wallets, and credit card information. Specifically, AMOS can target cryptowallets such as Electrum, Binance, Exodus, Atomic, and Coinomi.

The threat actor also offers additional services such as a web panel for managing victims, meta mask brute-forcing to steal seed and private keys, a crypto checker, and a dmg installer, after which the logs are shared via Telegram.

However, the report mentioned that macOS users can protect their systems from AMOS malware by installing a .dmg file on their machines. After installing, users will need to authenticate the installation with a user password with a fake system dialogue box following installation. Once installed, it will scan for sensitive information, which it will steal with the system password if necessary, and send to a remote server.

Top Headlines

US Imposes Fresh Sanctions On Iran Oil Hours After Talks In Oman
US Imposes Fresh Sanctions On Iran Oil Trade Hours After Talks In Oman
‘He Ran Inside And Blew Himself Up’: Witnesses Describe Islamabad Suicide Attack
‘He Ran Inside And Blew Himself Up’: Witnesses Describe Islamabad Suicide Attack
India Watching Iran Developments Closely, No Evacuation Planned: Jaishankar
India Watching Iran Developments Closely, No Evacuation Planned: Jaishankar
Champions Again! Sooryavanshi Storm Powers India To 6th U19 World Cup Title
Champions Again! Sooryavanshi Storm Powers India To 6th U19 World Cup Title

Videos

Tragic News: Kamal’s Homecoming Turns Into Fatal Accident
Breaking News: Nationwide Protests Erupt Over Netflix’s ‘Ghuskhor Pandit’; Brahmin Society Demands Action
Politics News: UP BJP Issues Notice to MLA Guddu Rajput Over Minister Santosh Dev Singh Standoff
Breaking News: AAP Leader Lucky Oberoi Shot Dead Outside Gurdwara in Jalandhar
Janakpuri Tragedy: Young Man Dies in Mysterious Late-Night Road Accident

Photo Gallery

25°C
New Delhi
Rain: 100mm
Humidity: 97%
Wind: WNW 47km/h
See Today's Weather
powered by
Accu Weather
Embed widget